ID

VAR-202503-0178


CVE

CVE-2025-2096


TITLE

TOTOLINK  of  ex1800t  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2025-002947

DESCRIPTION

A vulnerability classified as critical was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function setRebootScheCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mode/week/minute/recHour leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. TOTOLINK of ex1800t The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX1800T is a wireless repeater from China's TOTOLINK Electronics. No detailed vulnerability details are provided at present

Trust: 2.16

sources: NVD: CVE-2025-2096 // JVNDB: JVNDB-2025-002947 // CNVD: CNVD-2025-12095

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12095

AFFECTED PRODUCTS

vendor:totolinkmodel:ex1800tscope:eqversion:9.1.0cu.2112_b20220316

Trust: 1.0

vendor:totolinkmodel:ex1800tscope: - version: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope:eqversion:ex1800t firmware 9.1.0cu.2112 b20220316

Trust: 0.8

vendor:totolinkmodel:ex1800t 9.1.0cu.2112 b20220316scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-12095 // JVNDB: JVNDB-2025-002947 // NVD: CVE-2025-2096

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-2096
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-2096
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2025-002947
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-12095
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-2096
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-002947
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12095
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-2096
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-2096
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-002947
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12095 // JVNDB: JVNDB-2025-002947 // NVD: CVE-2025-2096 // NVD: CVE-2025-2096

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-002947 // NVD: CVE-2025-2096

EXTERNAL IDS

db:NVDid:CVE-2025-2096

Trust: 3.2

db:VULDBid:298954

Trust: 1.8

db:JVNDBid:JVNDB-2025-002947

Trust: 0.8

db:CNVDid:CNVD-2025-12095

Trust: 0.6

sources: CNVD: CNVD-2025-12095 // JVNDB: JVNDB-2025-002947 // NVD: CVE-2025-2096

REFERENCES

url:https://github.com/kn0sky/cve/blob/main/totolink%20ex1800t/os%20command%20injection%2004%20setrebootschecfg-_mode.md

Trust: 2.4

url:https://vuldb.com/?id.298954

Trust: 1.8

url:https://vuldb.com/?submit.515322

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://vuldb.com/?ctiid.298954

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2025-2096

Trust: 0.8

sources: CNVD: CNVD-2025-12095 // JVNDB: JVNDB-2025-002947 // NVD: CVE-2025-2096

SOURCES

db:CNVDid:CNVD-2025-12095
db:JVNDBid:JVNDB-2025-002947
db:NVDid:CVE-2025-2096

LAST UPDATE DATE

2025-06-15T23:31:57.657000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12095date:2025-06-11T00:00:00
db:JVNDBid:JVNDB-2025-002947date:2025-04-04T05:20:00
db:NVDid:CVE-2025-2096date:2025-04-03T15:24:48.847

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12095date:2025-06-10T00:00:00
db:JVNDBid:JVNDB-2025-002947date:2025-04-04T00:00:00
db:NVDid:CVE-2025-2096date:2025-03-07T22:15:39.187